{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T06:15:48Z","timestamp":1744179348250,"version":"3.37.3"},"reference-count":171,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-21-1-0039"],"award-info":[{"award-number":["FA9550-21-1-0039"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3409389","type":"journal-article","created":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T21:04:40Z","timestamp":1717535080000},"page":"80986-81003","source":"Crossref","is-referenced-by-count":2,"title":["SpyHammer: Understanding and Exploiting RowHammer Under Fine-Grained Temperature Variations"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6773-6395","authenticated-orcid":false,"given":"Lois","family":"Orosa","sequence":"first","affiliation":[{"name":"Information Technology and Electrical Engineering Department, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"}]},{"given":"Ulrich","family":"R\u00fchrmair","sequence":"additional","affiliation":[{"name":"Experimental Quantum Physics Department, LMU M&#x00FC;nchen, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9333-6077","authenticated-orcid":false,"given":"A.","family":"Giray Ya\u011flik\u00e7i","sequence":"additional","affiliation":[{"name":"Information Technology and Electrical Engineering Department, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0849-8724","authenticated-orcid":false,"given":"Haocong","family":"Luo","sequence":"additional","affiliation":[{"name":"Information Technology and Electrical Engineering Department, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5333-5726","authenticated-orcid":false,"given":"Ataberk","family":"Olgun","sequence":"additional","affiliation":[{"name":"Information Technology and Electrical Engineering Department, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"}]},{"given":"Patrick","family":"Jattke","sequence":"additional","affiliation":[{"name":"Information Technology and Electrical Engineering Department, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7725-4792","authenticated-orcid":false,"given":"Minesh","family":"Patel","sequence":"additional","affiliation":[{"name":"Information Technology and Electrical Engineering Department, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6153-9008","authenticated-orcid":false,"given":"Jeremie S.","family":"Kim","sequence":"additional","affiliation":[{"name":"Information Technology and Electrical Engineering Department, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"}]},{"given":"Kaveh","family":"Razavi","sequence":"additional","affiliation":[{"name":"Information Technology and Electrical Engineering Department, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0075-2312","authenticated-orcid":false,"given":"Onur","family":"Mutlu","sequence":"additional","affiliation":[{"name":"Information Technology and Electrical Engineering Department, ETH Z&#x00FC;rich, Z&#x00FC;rich, Switzerland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"ref2","first-page":"638","article-title":"Revisiting RowHammer: An experimental analysis of modern devices and mitigation techniques","volume-title":"Proc. ISCA","author":"Kim"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00090"},{"key":"ref4","first-page":"71","article-title":"Exploiting the DRAM RowHammer bug to gain kernel privileges","volume":"15","author":"Seaborn","year":"2015","journal-title":"Black Hat"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"ref6","article-title":"RowHammer.Js: A remote software-induced fault attack in Javascript","author":"Gruss","year":"2015","journal-title":"arXiv:1507.06955"},{"key":"ref7","first-page":"1","article-title":"Flip Feng Shui: Hammering a needle in the software stack","volume-title":"Proc. USENIX Secur.","author":"Razavi"},{"key":"ref8","first-page":"565","article-title":"DRAMA: Exploiting DRAM addressing for cross-CPU attacks","volume-title":"Proc. USENIX Secur.","author":"Pessl"},{"key":"ref9","first-page":"19","article-title":"One bit flips, one cloud flops: Cross-VM row hammer attacks and privilege escalation","volume-title":"Proc. USENIX Secur.","author":"Xiao"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.63"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53140-2_29"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2016.7495576"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152709"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951730"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927156"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_3"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/eurospw51379.2020.00102"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93411-2_5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00089"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329811"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2019.2915318"},{"key":"ref24","first-page":"497","article-title":"Terminal brain damage: Exposing the graceless degradation in deep neural networks under hardware fault attacks","volume-title":"Proc. USENIX Secur.","author":"Hong"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00020"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00085"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.169-195"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00016"},{"volume-title":"RowHammer\u2014GitHub Repository","year":"2024","key":"ref29"},{"key":"ref30","first-page":"1463","article-title":"Deephammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips","volume-title":"Proc. USENIX Security","author":"Yao"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833772"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560688"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833802"},{"key":"ref34","first-page":"213","article-title":"ThRowHammer: RowHammer attacks over the network and defenses","volume-title":"Proc. USENIX ATC","author":"Tatar"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337161"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2508148.2485928"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/9780470544426"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.21"},{"article-title":"Memory performance attacks: Denial of memory service in multi-core systems","volume-title":"Proc. USENIX Secur.","author":"Moscibroda","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.7"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2010.5416658"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2014.6974655"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337202"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.58"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446096"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2896377.2901453"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3084464"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3143314.3078590"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3140659.3080242"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00026"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322231"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835946"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446095"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3292040.3219661"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.62"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.30"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2016.2624298"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592000"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830820"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124544"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2018.00051"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00011"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00017"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00034"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2013.6522354"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2015.51"},{"key":"ref67","first-page":"185","article-title":"RowClone: Fast and energy-efficient in-DRAM bulk data copy and initialization","volume-title":"Proc. 46th Annu. IEEE\/ACM Int. Symp. Microarchitecture (MICRO)","author":"Seshadri"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00061"},{"key":"ref69","article-title":"In-DRAM bulk bitwise execution engine","author":"Seshadri","year":"2019","journal-title":"arXiv:1905.09822"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00036"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00045"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00032"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1394608.1382172"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665724"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589063"},{"key":"ref76","first-page":"288","article-title":"DRISA: A DRAM-based reconfigurable in-situ accelerator","volume-title":"Proc. 50th Annu. IEEE\/ACM Int. Symp. Microarchitecture (MICRO)","author":"Li"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480069"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00054"},{"key":"ref79","first-page":"1","article-title":"Fundamentally understanding and solving RowHammer","volume-title":"Proc. 28th Asia South Pacific Design Autom. Conf. (ASP-DAC)","author":"Mutlu"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S58398.2023.00042"},{"volume-title":"DDR4 SDRAM Standard","year":"2020","key":"ref81"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3214666"},{"key":"ref83","first-page":"3807","article-title":"Half-Double: Hammering from the next row over","volume-title":"Proc. USENIX Secur.","author":"Kogler"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560673"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179450"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480110"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3282172"},{"volume-title":"DRAM-Bender\u2014GitHub Repository","year":"2024","key":"ref88"},{"volume-title":"Xilinx Alveo U200 FPGA Board","year":"2024","key":"ref89"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2015.7322462"},{"volume-title":"Exploratory Data Analysis","year":"1977","author":"Tukey","key":"ref91"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.1981.1051630"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICISS.1997.630243"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04478-0"},{"key":"ref95","first-page":"27","article-title":"Detecting and mitigating data-dependent DRAM failures by exploiting current memory content","volume-title":"Proc. 50th Annu. IEEE\/ACM Int. Symp. Microarchitecture (MICRO)","author":"Khan"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2018.8494868"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00037"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714882"},{"volume-title":"About the Security Content of Mac EFI Security Update 2015-001","year":"2015","key":"ref99"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2014.2332177"},{"volume-title":"Row hammer refresh command","author":"Bains","key":"ref101"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2954679.2872390"},{"volume-title":"Distributed row hammer tracking","author":"Bains","key":"ref103"},{"volume-title":"Row hammer monitoring based on stored row hammer threshold value","author":"Bains","key":"ref104"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/NORCHIP.2016.7792886"},{"key":"ref106","first-page":"117","article-title":"Can\u2019t touch this: Software-only mitigation against RowHammer attacks targeting kernel memory","volume-title":"Proc. USENIX Secur.","author":"Brasser"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062281"},{"key":"ref108","first-page":"697","article-title":"ZebRAM: Comprehensive and compatible software protection against RowHammer attacks","volume-title":"Proc. OSDI","author":"Konoth"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00057"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322232"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967217"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00014"},{"key":"ref113","article-title":"Security analysis of the silver bullet technique for RowHammer prevention","author":"Ya\u011fl\u0131k\u00e7\u0131","year":"2021","journal-title":"arXiv:2106.07084"},{"volume-title":"Method and circuit for protecting a DRAM memory device from the row hammer effect","author":"Devaux","key":"ref114"},{"key":"ref115","first-page":"1","article-title":"MRLoc: Mitigating row-hammering based on memory locality","volume-title":"Proc. 56th ACM\/IEEE Design Autom. Conf. (DAC)","author":"You"},{"volume-title":"High Bandwidth Memory (HBM) DRAM","year":"2020","key":"ref116"},{"volume-title":"DDR5 SDRAM Standard","year":"2020","key":"ref117"},{"volume-title":"LPDDR5 SDRAM Standard","year":"2020","key":"ref118"},{"volume-title":"Throttling support for row-hammer counters","author":"Greenfield","key":"ref119"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070999"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179390"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070966"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179327"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10137204"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24337"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507716"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527421"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00088"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00035"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00022"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3206729"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833664"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527427"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00050"},{"article-title":"ABACuS: All-bank activation counters for scalable and low overhead RowHammer mitigation","volume-title":"Proc. USENIX Secur.","author":"Olgun","key":"ref135"},{"article-title":"SledgeHammer: Amplifying RowHammer via bank-level parallelism","volume-title":"Proc. USENIX","author":"Kang","key":"ref136"},{"article-title":"Go go gadget hammer: Flipping nested pointers for arbitrary data leakage","volume-title":"Proc. USENIX","author":"Tobah","key":"ref137"},{"article-title":"BLASTER: Characterizing the blast radius of RowHammer","volume-title":"Proc. DRAMSec","author":"Lang","key":"ref138"},{"key":"ref139","article-title":"WhistleBlower: A system-level empirical study on RowHammer","author":"He","year":"2023","journal-title":"IEEE Trans. Comput."},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00048"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00030"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref144","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"Proc. 44th ACM\/IEEE Design Autom. Conf.","author":"Suh"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1002\/cta.1825"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21599-5_3"},{"key":"ref147","article-title":"Power and timing side channels for PUFs and their efficient exploitation","author":"R\u00fchrmair","year":"2013","journal-title":"Cryptol. ePrint Arch."},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/CNNA.2010.5430303"},{"key":"ref149","first-page":"121","article-title":"Analog circuits for physical cryptography","volume-title":"Proc. ISICAS","author":"Chen"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28368-0_22"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2014.364"},{"key":"ref152","article-title":"Physical Turing machines and the formalization of physical cryptography","author":"R\u00fchrmair","year":"2011","journal-title":"Cryptol. ePrint Arch."},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927076"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126611007098"},{"key":"ref155","article-title":"Efficient erasable PUFs from programmable logic and memristors","author":"Gao","year":"2018","journal-title":"Cryptol. ePrint Arch."},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2015.7140255"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/1502781.1502786"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2010.5711471"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/hst.2008.4559053"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-021-00283-6"},{"key":"ref162","article-title":"On-chip electric waves: An analog circuit approach to physical uncloneable functions","author":"Csaba","year":"2009","journal-title":"Cryptol. ePrint Arch."},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1063\/1.3396186"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12368-9_22"},{"volume-title":"Method for security purposes","year":"2012","author":"Ruehrmair","key":"ref165"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-013-0052-8"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33027-8_15"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/2742060.2742069"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/2968455.2968519"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951729"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2030013"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10547262.pdf?arnumber=10547262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T20:58:49Z","timestamp":1719349129000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10547262\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":171,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3409389","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}